Network Security Services (NSS) 3.15.4 is a patch release for NSS 3.15. The bug fixes in NSS 3.15.4 are described in the "Bugs Fixed" section below.
The HG tag is NSS_3_15_4_RTM. NSS 3.15.4 requires NSPR 4.10.2 or newer.
NSS 3.15.4 source distributions are also available on ftp.mozilla.org for secure HTTPS download:
The following security-relevant bugs have been resolved in NSS 3.15.4. Users are encouraged to upgrade immediately.
- Bug 919877 - (CVE-2013-1740) When false start is enabled, libssl will sometimes return unencrypted, unauthenticated data from PR_Recv
- Implemented OCSP querying using the HTTP GET method, which is the new default, and will fall back to the HTTP POST method.
- Implemented OCSP server functionality for testing purposes (httpserv utility).
- Support SHA-1 signatures with TLS 1.2 client authentication.
- Added the --empty-password command-line option to certutil, to be used with -N: use an empty password when creating a new database.
- Added the -w command-line option to pp: don't wrap long output lines.
- CERT_REV_M_FORCE_POST_METHOD_FOR_OCSP: When this flag is used, libpkix will never attempt to use the HTTP GET method for OCSP requests; it will always use POST.
- Reordered the cipher suites offered in SSL/TLS client hello messages to match modern best practices.
- Updated the set of root CA certificates (version 1.96).
- Improved SSL/TLS false start. In addition to enabling the SSL_ENABLE_FALSE_START option, an application must now register a callback using the SSL_SetCanFalseStartCallback function.
- When building on Windows, OS_TARGET now defaults to WIN95. To use the WINNT build configuration, specify OS_TARGET=WINNT.
A complete list of all bugs resolved in this release can be obtained at https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&target_milestone=3.15.4&product=NSS
NSS 3.15.4 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.15.4 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).